Search results for:
-
Apr 24th, 2020
Playbook Fridays: Converting Apps
Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbook
-
Apr 22nd, 2020
Build a Single Source of Truth
Gartner® defines a SOAR platform as ”security orchestration, automation and response technologies that enable organizations to collect security threats data and alerts from different sources, where
-
Apr 22nd, 2020
PolySwarm
PolySwarm is a file reputation tool specialized in detecting new and emerging malware. Powered by a crowdsourced network of threat detection engines that are highly specialized, R&D focused and fa
-
Apr 21st, 2020
Get Instantaneous Awareness of Threat Intelligence with the Polarity-Recorded Future Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already u
-
Apr 17th, 2020
Playbook Fridays: Automatically import and tag your RSS feed data with Covid-19 Tags
Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Play
-
Apr 17th, 2020
Polarity User Tips: Polarity Modes
Today’s post continues an ongoing series on Polarity User Tips. We help our users make better decisions, faster, with augmented reality for your desktop. This guide explains how users can get the mo
-
Apr 15th, 2020
Creating Order from Chaos: Enabling (Even) Better Decision Making with ThreatConnect 6.0
For those that don’t know, I have 4 kids and a dog. The children are 9 and under. Fresno, my dog, is like 100 years old in “dog years.” My house is chaotic, to say the least. I remember being ab
-
Apr 15th, 2020
Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already u
-
Apr 15th, 2020
How is Tool Fatigue Adding Complexity to Your Workflow?
Remote teams – especially remote teams in cybersecurity – rely on tools to get the job done in every step of their to-do lists. There are so many tools out there to choose from that we eva
-
Apr 10th, 2020
Playbook Fridays: Potential Zoom-related Threats Dashboard
This Dashboard was created to track potential Zoom-related intelligence and indicators as the news of it being vulnerable was widely publicized. With many of us working from home these days, and in ge
-
Apr 9th, 2020
Turning Cobalt Into Diamonds: Building an Actor Profile For Hunting
Summary Hunting adversaries begins with understanding their behavior through data. In this blog post, we’ll use the Diamond Model as a vehicle to create an actor profile for the criminal group Cobal
-
Apr 8th, 2020
Do You See the Story Your Data is Telling?
I’ve been in security for nearly 20 years now, and my fascination for our industry is no less than when I started. The tech industry moves fast, and security moves even faster. This rapid pace and t